TechNet Cyber Supporting Partner Opportunities


Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the supporting partner opportunities available at TechNet Cyber 2022 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.

Have an idea for a supporting partner opportunity you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!

First Right of Refusal is currently active for several supporting opportunities. Please check back after Wednesday, March 9th to view any new opportunities that may become available. Deadline to purchase supporting partner opportunities is March 25th.

Juniper Networks  

Herndon,  VA 
United States
http://www.juniper.net/federal
  • Booth: 3404

Juniper Networks simplifies the complexities of networking with products, solutions and services in the cloud era to transform the way we connect, work and live. Through engineering and innovation, we remove the traditional constraints of networking to enable our customers and partners to deliver automated, scalable and secure networks that connect the world.


 Press Releases

  • (Mar 18, 2022)

    FEDERAL ORGANIZATIONS NEED A MISSION-FIRST NETWORK

    Build an agile, resilient, secure network fabric to support offensive and defensive operations

    Cyberwarfare has been described as the future of conflict between nations, whether that action is attacking another nation’s critical
    infrastructure such as the power grid or Internet, using resources to hit military-specific targets such as weapons systems or R&D
    programs, or stealing classified or top-secret information. Beyond offensive techniques, our nation needs cybersecurity experts to
    defend against other nations and make sure that critical functions proceed unhindered.


    The Challenge


    During a conflict, it’s expected that both sides will employ offensive cyberwar measures to make it harder for their opponents’ commands and messages to
    be received on the battlefield or for critical offensive and defensive systems to function. Commands and information that aren’t received in a timely manner can
    lead to a breakdown of strategy and planning. Cyber operations require a strong, secure infrastructure, and a network that is
    unable to avoid or repel attacks is an immediate disadvantage. But a conventional routed network, even when engineered for reliability and security, may not be
    enough when it comes to the future of warfare.

     

    A mission-first network is designed, implemented, and operated to adapt to the worst-case scenario. Commanders can modify network behavior as needed to
    ensure freedom of maneuver and freedom of action. A drone strike, a missile launch, or communicating intelligence from the field depends on a mission-first network.
    A mission-first network is in sharp contrast to how conventional networks support net-ready combat and mission operations. Today, network teams are all too familiar
    with the painstaking, time-consuming work of modifying the network for each operation. Detailed information about IP addresses, access control lists, ports,
    and protocols must be at their fingertips. Planning and making the necessary changes can take weeks or months, and network teams know that as more network
    reconfigurations are required to achieve a designed outcome, the more likely they will create a network that is brittle and prone to failure.

    The Juniper Networks Mission-First Network


    Solution


    The Juniper Networks mission-first network transforms the traditional ways of adapting the network to mission operations.
    The result is a self-driving, intent-based network that is ready for net-enabled combat and mission requirements.
    The foundation is the Juniper® Session Smart™ Router, which creates an advanced, service-centric network fabric that extends
    from client to cloud. Together, the Session Smart Router and Juniper Session Smart Conductor create the agile, secure, and resilient
    WAN connectivity that’s required for command and control, intelligence, surveillance and reconnaissance (C2ISR)—and with
    greater simplicity and operational efficiency than ever before. In a conventional routed network, packets are routed at Layer
    3 OSI in a stateless fashion, which adds complexity and creates the requirement for tunnel-based transport to create capabilities
    like SD-WAN.


    The Session Smart Router is a new type of router which routes sessions at Layer 4+, rather than individual packets at Layer
    3. Unlike a legacy SD-WAN approach, it does not use overlay tunnels and adds zero overhead. The Session Smart Router
    transcends the inherent brittle architecture and uses network resources more efficiently than traditional routers.
    The Session Smart Router’s tunnel-free architecture enables up to 75% reduction in headend infrastructure costs and a 15% to
    50% reduction in bandwidth usage1, which is especially critical when conducting operations with degraded connectivity and
    limited bandwidth.


    Features and Benefits 


    A mission-first network is smart. The Session Smart Router realizes the vision of intent-based
    networking. It is able to achieve this vision because it’s a “new” type of router.
    With the Session Smart Router, the intent of mission planners and the data model used to configure the network and the desired
    outcomes are aligned as closely as possible, enabling a new level of agility and control. The time-consuming, painstaking gap
    between the planner’s intention and the network configuration is closed—all because sessions are routed statefully across the
    fabric with end-to-end context, rather than routing packets as with a conventional routed network.

    The Session Smart Router enables the creation of a simple, reliable, application-aware network fabric that meets the most
    stringent performance, availability, and security requirements. Two unique control planes—the service-centric control plane
    and the session-aware data plane—create an intent-based network that can be rapidly adapted to changing mission
    requirements and environments. During cyber operations, leaders need to ensure freedom of  maneuver2 and freedom of action while denying the enemy
    the same. If cyber operations require immediate maneuvering in cyberspace or changing network posture or behavior
    programmatically, the Session Smart Router makes it easy by routing sessions.

     

    The Session Smart Router puts every session into context by
    asking three fundamental questions:
    • Who is the source of the traffic?
    • What is the intended destination?
    • How should the network behave?
    If the “who” is allowed access to the “what,” then the Session Smart Router determines “how” the session should be escorted
    to its destination in the most optimal way, based on the mission planner’s intent and the current state of the network. Global
    policy definitions ensure consistency everywhere, and policies can be updated in just a few mouse clicks.
    With tight alignment between the mission intent and network data model, the Session Smart Router understands how each
    session is related to a user, device, or application, its intended destination, and if policy allows, how the traffic should be
    escorted across the network. Policies are applied per session, not per tunnel, as with legacy SD-WAN solutions. Traffic can be
    delivered across any type of IP connectivity, such as 5G, LTE, SATCOM, MPLS, mesh networks, or public Internet.
    The result is a network that’s intelligent, adaptable, resilient, and secure. The Session Smart Router operates even when
    disconnected from orchestration, giving remote operators the ability to modify network behavior, view analytics, and modify
    configuration with the same local user interface and APIs.


    This allows for full functionality even in denied, degraded, intermittent, or limited (DDIL) environments.


 Products

  • Juniper - Session Smart Router
    Routing Innovation in the last 20 years, the 128T Session Smart™ Router provides a modernized, service-centric, session-oriented, and security-infused routing model for building context-aware networks....

  • Juniper Smart Session Routing replaces complex out-of- band routing protocols, tunnel-based network overlays, and cumbersome provisioning systems with centralized control, intelligent service routes, and in-band (metadata) signaling. At the heart of the 128T Router is Secure Vector Routing (SVR), which is a tunnel-free, session-oriented approach that enables the network to differentiate the way it delivers applications and services with unmatched simplicity, security, and scalability. It’s also fully compatible and interoperable with existing network protocols and architectures. The 128T SSR  is a software based, and can run on any X86 server. It is fully capable of running without being connected to the SSR Conductor ( Orchestration ) controller. It is ideal for deployment for anything ranging from virtualized tactical environments to Enterprise SMIT Transport.

    Key Features

        Application-aware routing

        Fail-safe service delivery

        Orchestration and automation

        Zero Trust security

        Centralized Mist AI Cloud-managed option

    Features + Benefits

    Optimized for User Experience

    The only product in the industry with a network routing fabric expressly designed to connect users with unparalleled experience, not just to connect devices.

    Breakthrough Economics

    Tunnel-less architecture enables up to 75% reduction in headend infrastructure costs and 30 to 50% reduction in bandwidth costs.

    Visibility and Insights

    Delivers richer and more granular services and sessions than packet-based router solutions.

    Zero Trust Security

    The zero-touch fabric imbues secure vector routing with access control, directionality, and segmentation policy.

    Scale and Speed

    Routing fabric rapidly scales to thousands of sites while accelerating deployment of services through centralized orchestration of global policies.

    Agility

    Session-smart fabric maintains session, tenant, and dynamic workload context end to end; makes the network more responsive to conditions in the underlay.

    Application Awareness and Control

    Supports load balancing and traffic steering based on the session policies and network status.

    Centralized Full-Lifecycle Cloud Management

    Simplified deployment and rollout with easy claim-code zero-touch provisioning (ZTP), operated from the Mist AI Cloud.

  • Security Director Cloud
    Security Director Cloud is your portal to Secure Access Service Edge (SASE), bridging your current security deployments with your SASE rollout. Security Director Cloud enables organizations to manage security everywhere, on-premises, in the cloud....

  • Security Director Features and Benefits
    Features Description Benefits
    Secure Edge Provides FWaaS in a single-stack software architecture with application control, IPS, anti-malware, web proxy and filtering, and advanced threat protection all delivered as a service. Enables administrators to seamlessly secure their remote workforce with consistent security policies that follow the user wherever they go.
    Security Director Insights Collects and automatically correlates data across multiple security layers—email, endpoint, server, cloud workloads and network—so threats are detected faster, and security teams can improve investigation and response times. Prevents future attacks with mitigation rules.
    • Understand when and where an attack is happening by using it to correlate and prioritize security events from multiple security solutions across various parts of the network.
    • Use custom threat and incident scoring so that security teams respond to and can mitigate attacks that have the potential to do the most harm to the business.
    • Mitigate active threats across the network—on SRX Series firewalls, EX and QFX Series Switches, wired and wireless access points driven by Mist AI, along with third-party solutions—with one click.
    Policy Enforcer Creates and centrally manages security policies through a user intent-based system, evaluating threat intelligence from multiple sources while dynamically enforcing policies in near real-time across the network. Enforces threat management policies at firewalls and access switches, aggregating threat feeds from Advanced Threat Prevention Cloud, SecIntel, and on-premises custom threat intelligence solutions with allow list and blocklist support.
    • Reduces the risk of compromise by eliminating stale rules and automatically updating enforcement based on network threat conditions. 
    • Improves protective posture by quarantining and tracking infected hosts. 
    • Allows security practitioners to focus on maximizing security rather than writing tedious policy rules.
    Firewall policy analysis Provides the ability to schedule reports that show shadow or redundant firewall rules are and recommends actions to fix all reported issues. Allows administrators to maintain an efficient firewall rule base by quickly identifying ineffective and unnecessary rules.
    Firewall rule placement guidance Upon creation of a new rule, analyzes existing firewall rule base to recommend optimal position and application. Significantly reduces shadowing rules.
    Metadata-based policies Enables administrators to create object metadata-based user-intent firewall policies. Simplifies policy creation and maintenance workflows. In addition to making policies more readable from a user intent perspective, this feature streamlines firewall troubleshooting.
    Dynamic policy actions Enables security administrators to initiate different actions, including firewall, logging, IPS, URL filtering, and Antivirus, among others, under different conditions. Reduces the time required to adjust the organization’s security posture under different conditions and streamlines threat remediation workflows.
    Firewall policy hit count Shows hit counts for each firewall via meters and filters that display which rules are hit the least. Security Director also can keep a lifetime hit count. Allows administrators to assess each firewall rule’s effectiveness and quickly identify unused rules, resulting in a better-managed firewall environment.
    Live threat map Displays where threats are originating in near real-time and allows you to take action to stop them. Provides near-real-time insight into network-related threats. Allows you to block traffic going to or coming from a specific country with a single click.
    Security Assurance Automate security policies across the network, including firewalls, routers, and switches for accurate enforcement, consistent security, and compliance. Guarantee that security rules are always placed correctly for intended effectiveness.
    Innovative application visibility and management Provides an easy and intuitive way to see which applications use the most bandwidth, have the most sessions, or are most at risk. Know which users are accessing non-productive applications and by how much. Top talkers are displayed in an easy-to-understand manner. Block applications, IP address, and users with a simple mouse click. Delivers greater visibility, enforcement, control, and protection over the network.
  • Juniper Apstra
    Use Juniper Apstra intent-based networking software to automate and validate the design, deployment, and operations of your data center network in multivendor environments....

  • Use Juniper Apstra intent-based networking software to automate and validate the design, deployment, and operations of your data center network in multivendor environments. Apstra accelerates everyday operations with a single source of truth, powerful analytics, and root-cause identification, so you can quickly pinpoint and resolve issues.

    For management of EVPN-VXLAN and IP fabrics, Apstra significantly reduces deployment times with validated templates and zero-touch provisioning (ZTP). It also averts outages with predictive insights, shortens time to resolution, and diminishes human error with change control and fast, all-network rollback.

    Key Features


    • Intent-based network design and operations
    • Support for multivendor environments
    • Automated zero-touch deployment
    • Continuous validation
    • Intent Time Voyager for network rollback
    • Lifecycle network management
    • Advanced telemetry through intent-based analytics and root-cause identification
    • Cohesive security policy definition and enforcement
    • Support for modern network platforms in data centers of any scale, including edge data centers

    Features + Benefits

    Reliable, Automated Operations

    Automate network deployment and operations through validated and repeatable designs, along with predictive analysis and proactive alerts of deviations. 

    Simplicity and Flexibility

    Manage workflows easily, even with minimal networking expertise, by automating manual tasks and eliminating vendor-specific configurations.

    Enhanced Network Security

    Track the origin of network changes and ensure granular enforcement where needed. You can use intent-based policy assurance, connectivity restrictions for multitenant environments, and enhanced role-based access control (RBAC) to create blueprint-specific roles.

    Resource Efficiencies

    Utilize IT resources efficiently with validated designs and automated and assured operations that use a single source of truth for knowledge retention and verify changes against intent.

    Speed and Agility

    Implement network changes faster with change control and validation, along with compliance auditing, for a scalable and versatile network. You’ll also significantly improve service delivery times, reduce mean time to resolution (MTTR), and shorten maintenance windows.